Mobile Device Management

Until recently, IT typically issued and supported one mobile device platform. But now workers increasingly expect to be treated as consumers, with the ability to choose how they access the company network based on their smartphone and tablet preference.

With this “bring your own device” (BYOD) revolution, it is more important than ever to integrate device management into your enterprise management structure. Taking a holistic approach and managing – on a single pane of glass – multiple mobile device platforms and types alongside your servers, desktops and laptops ensures consistent application of your corporate security policies across all endpoints that access your network.

By leveraging a single Mobile Device Management (MDM) platform, your IT team gains the ability to support a diverse fleet of devices—and easily and securely implement a flexible BYOD strategy.

Our company works with all mobile devices in the US, and will all carriers. We currently are developing on the Android Platform only at this time*. (subject to change) We offer root and jailbreaking services for Apple and Android devices, along with installing backup services when applicable.

 

 

  • Address business and technology issues of security, complexity and bring your own device (BYOD) in mobile environments.
  • Manage enterprise and personal data separately with capabilities such as selective wipe.
  • Leverage a single infrastructure to manage all enterprise devices—smartphones, tablets, laptops, desktops and servers.
  • Support devices using Apple iOS, Google Android, and Microsoft Windows Phone platforms.

Protect mobile devices as they access more and more sensitive systems—and protect the organization from unauthorized or corrupted devices. Mobile Device Management enables IT departments to:

  • Detect security threats on devices and automatically take countermeasures.
  • Automatically identify non-compliant devices.
  • Configure and enforce password policies, encryption, virtual private network (VPN) access and camera use.
  • Selectively wipe only corporate data such as calendar, email, contacts and enterprise-managed applications when a device is lost or stolen.
  • Control non-compliance by disabling access to enterprise resources such as email and applications, or by issuing user notifications until corrective actions are implemented.
Supported MDM Platforms Apple iOS, Google Android*, Microsoft Windows Mobile
Other Supported Endpoint Platforms Microsoft Windows, Mac® OS
Management Actions Selective wipe, full wipe, deny email access, remote lock, user notification
Application Management Application inventory, enterprise app store, whitelisting, blacklisting
Policy & Security Management Password policies, device encryption
Location Services Track company-owned devices and locate on map
Enterprise Access Management Configuration of email, VPN, Wi-Fi
Server Requirements Microsoft SQL Server 2005/2008
Microsoft Windows Server 2003/2008/2008 R2
Console Requirements Microsoft Windows 7/Vista/2008/2008 R2/7

Apple® iOS, Google® Android, and Microsoft® Windows Phone